ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Exploring New Features, Uses for Secure Web Gateway Appliances

    Sponsored by: TechTarget Security

    In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.

  • Implementing Replication: Balancing Cost vs. Convenience

    Sponsored by: TechTarget Storage

    Access this exclusive disaster recovery handbook about replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013.

  • Consumerization 101: Defining & Enforcing a Successful BYOD Policy

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.

  • VM Backup Methods for Quick VM Recovery

    Sponsored by: TechTarget Storage

    Learn two essential approaches for getting a server back online in just minutes – the failover method and data prioritization and discover which strategy trades slightly more downtown for less up-front data storage waste.

  • Top 5 Enterprise Mobile Security Issues

    Sponsored by: TechTarget Security

    While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more!

  • BYOPC Strategy: Policies and Problem Solving

    Sponsored by: TechTarget Security

    Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.

  • Four DLP Best Practices To Enhance Security

    Sponsored by: TechTarget Security

    Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.

  • A Guide to MAM and Planning for BYOD Security in the Enterprise

    Sponsored by: TechTarget Security

    In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.

  • Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them

    Sponsored by: TechTarget Security

    Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.

  • Tape's New Niche: Long-Term Data Retention

    Sponsored by: Iron Mountain

    This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.

  • The Importance of High-Availability Systems in Disaster Recovery Plans

    Sponsored by: Neverfail

    Learn why high-availability systems are integral components of disaster recovery plans in today's always-on business climate by checking out this expert SearchDisasterRecovery.com E-Guide.

  • New Stats and Tools Dispel Prevailing VM Backup Myths

    Sponsored by: Idera

    In this expert, exclusive E-Guide from SearchDataBackup.com, learn about other myths surrounding VM backup and explore the results of a 2012 survey your peers took regarding data protection for VMs. Read on to catch up on the most recent developments that have simplified the virtual data protection space.

  • Emergency Management Plans Made Easy & Practical

    Sponsored by: VMware, Inc.

    Your DR plan covers immediate incident response, but does it address long-term post-crisis support? Learn about the key phases of an effective emergency management program - from prevention to resolution - by reading this exclusive SearchSMBStorage.com E-Guide.

  • Backup Apps: State of the Art

    Sponsored by: TechTarget Storage

    Check out this expert January 2013 Storage Handbook to explore backup apps going into the new year, and get the scoop on cloud backup and DR, snapshots, VM backups and big data protection.

  • Expert Tips for Implementing Cloud Storage

    Sponsored by: OnX USA LLC

    Access this SearchStorage.com E-Guide to find strategies to consider and leverage before implementing cloud techs in your infrastructure. Read on for industry ace Arun Taneja's insight into cautions about signing on with a cloud storage provider before you have the details on them, and explore long-term considerations for your cloud environment.

  • Presentation Transcript: Content Monitoring in the Enterprise

    Sponsored by: Lumension

    This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.

  • IBM Security Network Intrusion Prevention System

    Sponsored by: IBM

    This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.

  • Comparing Email Archiving Software with General Archiving Software

    Sponsored by: Symantec Corporation

    Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.

  • CW Europe - November Edition

    Sponsored by: TechTarget ComputerWeekly.com

    The November 2012 edition of CWEurope focuses on what should always be one of your top IT priorities: Disaster recovery. Without a plan B, you risk the continuance of your business in the event of a natural disaster, hardware malfunction, human error or digital threat. It's disaster recovery or disaster devastation - the choice is up to you.

  • Secure your data – protect your business

    Sponsored by: TechTarget ComputerWeekly.com

    This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.

  • Extending Tape Life with Cloud Computing

    Sponsored by: NTT America, Inc.

    This expert SearchDisasterRecovery.com E-Guide, featuring ESG Senior Analyst Terri McClure, discusses tape's future, including the latest innovations in tape. Check it out to explore cloud-based data protection and disaster recovery approaches, and discover the five crucial "R"s to address during a crisis.

  • Presentation Transcript: Virtualize Mission-Critical Applications With Confidence

    Sponsored by: DataCore Software Corporation

    This brief paper contains insight into the most effective way to overcome the storage-related problems causing virtualized business-critical applications to run poorly.  The paper describes how to shape storage behavior to achieve the desired speed and predictable response users expect.

  • Presentation Transcript: Confidential Documents at Risk

    Sponsored by: WatchDox

    Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.

  • Five data protection guidelines for business continuity - Presentation Transcript

    Sponsored by: DellEMC and Intel®

    Jon William Toigo covers data protection guidelines, including mirroring, tape backup and WAN-based replication technologies.

  • Cornell University Chooses Red Hat Storage for Demanding HPC Environment

    Sponsored by: Red Hat

    In this case study, learn how a New York University found a storage solution that helped to promote research, education and technology transfer in biotech, and explore the solution that's robust enough to perform DNA sequencing, proteomics and imaging.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.